Archive

2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

01/18/2017

Emerging Cyber Threats

Emerging Cyber Threats


Nick Sturgeon - IN-ISAC
(347.8MB): Video Icon MP4 Video   Watch on Youtube
01/25/2017

Changing the Economics of the Network

Changing the Economics of the Network


Jean Camp - Indiana University
(171.4MB): Video Icon MP4 Video   Watch on Youtube
02/01/2017

Network Deception as a Threat Intelligence Platform

Network Deception as a Threat Intelligence Platform


Vincent Urias - Sandia
(242.1MB): Video Icon MP4 Video   Watch on Youtube
02/08/2017

Cyber Security in Large Complex Corporations

Cyber Security in Large Complex Corporations


Neil Cassidy
(289.9MB): Video Icon MP4 Video   Watch on Youtube
02/15/2017

Behavioral and Computational Aspects of Network Security Games

Behavioral and Computational Aspects of Network Security Games


Ashish Hota - Purdue University
(81.3MB): Video Icon MP4 Video   Watch on Youtube
02/22/2017

A2C: Self Destructing Exploit Executions via Input Perturbation

A2C: Self Destructing Exploit Executions via Input Perturbation


Yonghwi Kwon - Purdue University
(121.4MB): Video Icon MP4 Video   Watch on Youtube
03/01/2017

Cancelled



03/08/2017

The Rise of Cyber-Crime: A Legal Perspective

The Rise of Cyber-Crime: A Legal Perspective


Stephen Reynolds - Ice Miller
(140.0MB): Video Icon MP4 Video   Watch on Youtube
03/22/2017

CIO Risk Appetite and Information Security Management

CIO Risk Appetite and Information Security Management


Tawei (David) Wang - DePaul University
(320.0MB): Video Icon MP4 Video   Watch on Youtube
03/29/2017

DataShield: Configurable Data Confidentiality and Integrity

DataShield: Configurable Data Confidentiality and Integrity


Scott Carr - Purdue University
(140.3MB): Video Icon MP4 Video   Watch on Youtube
04/12/2017

Information Flow Security in Practical Systems

Information Flow Security in Practical Systems


Limin Jia - Carnegie Mellon University
(372.6MB): Video Icon MP4 Video   Watch on Youtube
04/19/2017

Pushing Computers to the Edge: Next Generation Security and Privacy Controls for Systems and IoT Devices

Pushing Computers to the Edge: Next Generation Security and Privacy Controls for Systems and IoT Devices


Ron Ross - National Institute for Standards and Technology (NIST)
(624.3MB): Video Icon MP4 Video   Watch on Youtube
04/26/2017

Enabling Trust and Efficiency in Provenance-Aware Systems

Enabling Trust and Efficiency in Provenance-Aware Systems


Adam Bates - University of Illinois at Urbana-Champaign
(575.2MB): Video Icon MP4 Video   Watch on Youtube
08/30/2017

The Stark Reality of Red vs. Blue and Why it's Not Working

The Stark Reality of Red vs. Blue and Why it's Not Working


Chris Roberts - Acalvio Technologies
(149.2MB): Video Icon MP4 Video   Watch on Youtube
09/06/2017

Secure Code Development

Secure Code Development


Doug Smith - Northrop Grumman
(153.9MB): Video Icon MP4 Video   Watch on Youtube
09/13/2017

Advanced Testing Assessments in the Power & Utilities Industry

Advanced Testing Assessments in the Power & Utilities Industry


Bob Cheripka - Deloitte
(135.4MB): Video Icon MP4 Video   Watch on Youtube
09/20/2017

 Counter UAS Challenges and Technology

Counter UAS Challenges and Technology


Vince D'Angelo - SRC
(123.4MB): Video Icon MP4 Video   Watch on Youtube
09/27/2017

Vulnerability Scanning, how it works and why

Vulnerability Scanning, how it works and why


Tony Huffman - Tenable Network Security
(94.8MB): Video Icon MP4 Video   Watch on Youtube
10/11/2017

Memory Hard Functions and Password Hashing

Memory Hard Functions and Password Hashing


Jeremiah Blocki
(147.6MB): Video Icon MP4 Video   Watch on Youtube
10/18/2017

 Locally Differential Private Protocols for Frequency Estimation

Locally Differential Private Protocols for Frequency Estimation


Tianhao Wang - Purdue University
(106.3MB): Video Icon MP4 Video   Watch on Youtube
11/01/2017

Opportunities and Perils of the Cyber Revolution

Opportunities and Perils of the Cyber Revolution


Mikhail J. Atallah
(564.6MB): Video Icon MP4 Video   Watch on Youtube
11/08/2017

Refraction Networking: Censorship Circumvention in the Core of the Internet

Refraction Networking: Censorship Circumvention in the Core of the Internet


Nikita Borisov - University of Illinois at Urbana-Champaign
(342.3MB): Video Icon MP4 Video   Watch on Youtube
12/06/2017

Penetration Testing: What? Why? How?

Penetration Testing: What? Why? How?


Nat Shere - Rook Security
(308.3MB): Video Icon MP4 Video   Watch on Youtube

Coming Up!

Our annual security symposium will take place on April 7 & 8, 2020.
Purdue University, West Lafayette, IN

More Information